This Blog is managed by Pratin Ashtekar and Carly Exum. The postings on this site solely reflect the personal views of each author and do not necessarily represent the views,positions,strategies or opinions of IBM or IBM management. IBM reserves the right to remove content deemed inappropriate.

Welcome to the Business Insight blog, your all access pass to the very best thought leadership, information and tools for creating smarter business strategies and practices. You'll discover a broad range of resources including real-life case studies, insightful analyses, blogs, articles and ideas from leading experts in diverse industries.

In
a
recent
IBM
global
study
among
senior
executives,
75%
said
data
theft
and
cyber
attacks
negatively
impact
customer
satisfaction
and
brand
reputation.
61%
said
theft
and
attacks
are
the
greatest
threats
to
their
company’s
reputation.
Another
recent
survey,
by
the
Association
of
Certified
Fraud
Examiners,
found
that
the
typical
... [ + Read more ]

Now
more
than
ever,
businesses
are
being
tested
by
the
security
of
their
networks.
Security
threats
are
increasing
and
so
is
the
need
for
security
expertise.
Despite
this
heightened
demand,
skilled
IT
security
staff
are
in
short
supply.
What
has
this
meant
for
companies?
The
lack
of
staff
and
skills
has
... [ + Read more ]

Since
moving
into
the
security
space,
I’m
either
more
attuned
to
the
prevalence
of
data-breech
incidents
or
they
are
accelerating
at
a
worrying
rate.
Spanning
the
spectrum
from
large
enterprise,
such
as
the
well-publicised
PlayStation
Network
hack,
to
the
individual
level,
such
as
the
recent
incident
featuring
Hollywood
celebrities,
examples
... [ + Read more ]

The
Become
a
social
business
in
the
cloud
Cross-Industry
whitepaper
provides
an
interesting
overview
of
IBM
SmartCloud
for
Social
Business
collaboration
services.
As
a
recognised
leader
in
social
collaboration
technology,
IBM
is
very
much
at
the
forefront
in
not
only
developing
social
platforms
which
are
top-of-class,
but
... [ + Read more ]

In
this
video
Jim
Resch,
Director
of
Technical
Sales
for
Tivoli
Endpoint
Management
(TEM)
provides
an
overview
of
the
features
of
IBM
Tivoli
Endpoint
Manager.
My
role
requires
that
I
maintain
awareness
of
the
capabilities
of
the
Tivoli
portfolio,
yet
it
is
only
when
you
step
back
and
assess
the
real
value
of
these
... [ + Read more ]

The
question
has
never
been
more
pressing.
Today's
organisations
are
constantly
pushed
to
be
operational
24/7.
New
technologies
are
emerging
all
the
time.
More
people
are
using
smart
devices,
and
wanting
to
connect
these
devices
to
the
corporate
network.
On
top
of
that,
threats
are
becoming
increasingly
sophisticated.
Hacking,
which
... [ + Read more ]

In
this
article
by
Eric
Z
Maass,
Chief
Technology
Officer
at
Lighthouse
Security
Group,
the
critical
importance
of
securing
and
protecting
information
and
related
assets
is
discussed.
In
recent
times
we
have
witnessed
an
explosion
in
the
amount
of
data
produced,
shared
and
analysed.
The
security
implications
that
stem
from
... [ + Read more ]

Endpoints
are
so
versatile
these
days.
While
they
be
found
virtually
anywhere
and
do
almost
anything,
they
can
also
make
an
organisation
vulnerable
to
security
threats. Everyone
is
literally
a
target.
An
endpoint
presents
a
valuable
target
for
a
cyber
criminal. So
why
are
endpoints
such
a
security
risk? Endpoints
are
dynamic
environments
... [ + Read more ]

How
many
business
owners
can
identify
with
the
plight
of
Christchurch
businesses
that
spent
weeks
trying
to
get
their
precious
business
data
from
within
the
CBD
cordon?
How
many
of
them
were
unable
to
contact
customers,
suppliers,
and
staff
whose
details
were
still
in
the
office? The
frustrating
thing
is
how
... [ + Read more ]

A
new,
remote
approach
to
IT
maintenance
is
better
than
insurance. Wouldn’t
it
be
wonderful
if
your
car
could
send
you
an
email
to
let
you
know
that
early
last
week,
one
of
its
wheels
was
out
of
alignment,
so
the
manufacturer
sent
someone
out
to
repair
it
while
you
left
... [ + Read more ]

Smartphones
and
tablets
have
quickly
changed
the
face
of
computing
in
the
business
world.
Leading
research
houses
like
Forrester,
IDC
and
Gartner
are
predicting
that
businesses
will
purchase
more
smartphones
and
tablets
this
year
than
traditional
PCs.
You
could
say
we've
entered
the
post-PC
age.
And
without
doubt
it's
not
just
the
businesses
buying
them.
Employee-owned
... [ + Read more ]

A
great
video
that
talks
about
security
and
cloud
in
a
simple
and
easy
to
follow
3
step
process.What
clients
don't
realise
is
that
addressing
security
in
the
cloud
is
no
different
to
a
traditional
on-premise
hardware
centric
environment.
If
anything,
the
paradigm
shift
to
look
at
security
up
front
... [ + Read more ]

Today’s
executives
understand
the
need
for
information
security
but
still
struggle
to
manage
the
cost
and
complexity
of
a
myriad
of
security
technologies
for
everything
from
threat
prevention
to
email
security,
vulnerability
scanning
and
security
event
and
log
management.
While
important
to
a
comprehensive
security
strategy,
implementing
and
managing
these
... [ + Read more ]

Apple’s
iPad,
coming
if
you’re
ready
or
not
Forbes
magazine
reports
Apple
has
sold
more
than
25
million
iPads
in
the
14
months
since
the
iconic
tablet
device
was
first
launched
in
April
2010.
Despite
the
hype,
you
don’t
need
to
worry
about
tablets
displacing
desktop
PCs
and
laptops
in
small
business
offices.
Tablets
... [ + Read more ]